default search action
Nitesh Saxena
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j34]Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? Proc. Priv. Enhancing Technol. 2024(1): 280-299 (2024) - [j33]Prakash Shrestha, Ahmed Tanvir Mahdad, Nitesh Saxena:
Sound-based Two-factor Authentication: Vulnerabilities and Redesign. ACM Trans. Priv. Secur. 27(1): 5:1-5:27 (2024) - [c138]Mashari Alatawi, Nitesh Saxena:
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal. CODASPY 2024: 277-288 - [c137]Zengrui Liu, Nitesh Saxena:
Dual Study of Canvas Fingerprinting Based Authentication: A Novel Spoofing Attack and the Countermeasure. ICDCS 2024: 1354-1364 - [c136]Anuradha Mandal, Cagri Arisoy, Nitesh Saxena:
News Reader: A News Interest Identification Attack Using Single-Electrode Brainwave Signals. ISC (2) 2024: 183-202 - [c135]Fei Zhao, Chengcui Zhang, Maya Shah, Nitesh Saxena:
BubbleSig: Same-Hand Ballot Stuffing Detection. MIPR 2024: 507-510 - [i36]Shalini Saini, Nitesh Saxena:
Privacy and Security of Women's Reproductive Health Apps in a Changing Legal Landscape. CoRR abs/2404.05876 (2024) - [i35]Jimmy Dani, Kalyan Nakka, Nitesh Saxena:
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers. CoRR abs/2405.19683 (2024) - [i34]Kalyan Nakka, Jimmy Dani, Nitesh Saxena:
Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models. CoRR abs/2406.05364 (2024) - [i33]Jimmy Dani, Brandon McCulloh, Nitesh Saxena:
When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords. CoRR abs/2407.16964 (2024) - [i32]Zengrui Liu, Jimmy Dani, Shujiang Wu, Yinzhi Cao, Nitesh Saxena:
Identified-and-Targeted: The First Early Evidence of the Privacy-Invasive Use of Browser Fingerprinting for Online Tracking. CoRR abs/2409.15656 (2024) - [i31]Jimmy Dani, Kalyan Nakka, Nitesh Saxena:
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2024: 852 (2024) - 2023
- [j32]Shalini Saini, Nitesh Saxena:
A Survey of Threats to Research Literature-dependent Medical AI Solutions. ACM Comput. Surv. 55(14s): 315:1-315:26 (2023) - [j31]Prakash Shrestha, Hien Thi Thu Truong, Pupu Toivonen, Nitesh Saxena, Sasu Tarkoma, Petteri Nurmi:
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures. Pervasive Mob. Comput. 88: 101720 (2023) - [c134]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. CCS 2023: 446-459 - [c133]Shalini Saini, Nitesh Saxena:
Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis. CNS 2023: 1-9 - [c132]Neetu Gupta, Arjun Singh, Nitesh Saxena, G. Ravivarman, P. Gajendran, Pallavi Deshpande:
Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques. IC3I 2023: 2089-2092 - [c131]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EmoLeak: Smartphone Motions Reveal Emotions. ICDCS 2023: 316-326 - [c130]Fei Zhao, Chengcui Zhang, Nitesh Saxena, Dan S. Wallach, AKM Shahariar Azad Rabby:
Ballot Tabulation Using Deep Learning. IRI 2023: 107-114 - [c129]Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices. MobiCom 2023: 59:1-59:15 - [c128]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Nitesh Saxena, Yan Wang, Yingying Chen:
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. MobiHoc 2023: 308-309 - [c127]Tianfang Zhang, Cong Shi, Payton Walker, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets. MobiSys 2023: 96-109 - [c126]Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, Yingying Chen:
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. SP 2023: 3382-3398 - [c125]Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena:
Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! USENIX Security Symposium 2023: 859-876 - [c124]Ahmed Tanvir Mahdad, Nitesh Saxena:
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. WISEC 2023: 175-186 - [c123]Mashari Alatawi, Nitesh Saxena:
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. WISEC 2023: 187-201 - [c122]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. WISEC 2023: 203-214 - [i30]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. CoRR abs/2302.02042 (2023) - [i29]Mashari Alatawi, Nitesh Saxena:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. CoRR abs/2307.03426 (2023) - [i28]Mashari Alatawi, Nitesh Saxena:
VOICE-ZEUS: Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations. CoRR abs/2310.13894 (2023) - 2022
- [j30]Xin Yang, Song Yang, Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena:
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices. IEEE Trans. Mob. Comput. 21(10): 3565-3580 (2022) - [c121]Prakash Shrestha, Nitesh Saxena:
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. ACNS 2022: 85-104 - [c120]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. ACNS 2022: 147-169 - [c119]Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. AsiaCCS 2022: 67-81 - [c118]Payton Walker, Nitesh Saxena:
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. EuroS&P 2022: 537-554 - [c117]Cong Shi, Tianming Zhao, Wenjin Zhang, Ahmed Tanvir Mahdad, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds. ICDCS 2022: 680-690 - [c116]Mashari Alatawi, Nitesh Saxena:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. ICISC 2022: 100-123 - [c115]Tianfang Zhang, Cong Shi, Tianming Zhao, Zhengkun Ye, Payton Walker, Nitesh Saxena, Yan Wang, Yingying Chen:
Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets. MobiSys 2022: 529-530 - [c114]Tianming Zhao, Zhengkun Ye, Tianfang Zhang, Cong Shi, Ahmed Tanvir Mahdad, Yan Wang, Yingying Chen, Nitesh Saxena:
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets. MobiSys 2022: 589-590 - [c113]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. PST 2022: 1-12 - [c112]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? PST 2022: 1-11 - [c111]Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. WISEC 2022: 119-124 - [c110]Anuradha Mandal, Nitesh Saxena:
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. WISEC 2022: 175-187 - [i27]Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? CoRR abs/2202.00885 (2022) - [i26]Shalini Saini, Nitesh Saxena:
Predatory Medicine: Exploring and Measuring the Vulnerability of Medical AI to Predatory Science. CoRR abs/2203.06245 (2022) - [i25]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? CoRR abs/2206.10728 (2022) - [i24]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. CoRR abs/2207.08376 (2022) - [i23]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. CoRR abs/2212.12151 (2022) - 2021
- [j29]Cong Shi, Yan Wang, Yingying (Jennifer) Chen, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. IEEE Secur. Priv. 19(6): 83-92 (2021) - [j28]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c109]Payton Walker, Nitesh Saxena:
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. ACSAC 2021: 414-424 - [c108]S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. AsiaCCS 2021: 67-81 - [c107]Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. AsiaCCS 2021: 82-94 - [c106]Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. AsiaCCS 2021: 447-461 - [c105]Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. EuroS&P 2021: 21-36 - [c104]Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. EuroS&P 2021: 71-87 - [c103]Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Analyzing the Security of OTP 2FA in the Face of Malicious Terminals. ICICS (1) 2021: 97-115 - [c102]Cong Shi, Xiangyu Xu, Tianfang Zhang, Payton Walker, Yi Wu, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors. MobiCom 2021: 478-490 - [c101]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [c100]Payton Walker, Nitesh Saxena:
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. WISEC 2021: 273-287 - [c99]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. WISEC 2021: 288-299 - [i22]Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena:
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. CoRR abs/2102.13607 (2021) - [i21]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques. CoRR abs/2110.10129 (2021) - 2020
- [c98]Prakash Shrestha, Zengrui Liu, Nitesh Saxena:
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. ACSAC 2020: 706-716 - [c97]Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. ACSAC 2020: 829-842 - [c96]Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. ACSAC 2020: 870-883 - [c95]Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:
CREPE: A Privacy-Enhanced Crash Reporting System. CODASPY 2020: 295-306 - [c94]Prakash Shrestha, Nitesh Saxena:
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. WISEC 2020: 13-24 - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e2]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents] - [i20]Chen Wang, Cong Shi, Yingying Chen, Yan Wang, Nitesh Saxena:
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity. CoRR abs/2003.09083 (2020)
2010 – 2019
- 2019
- [j27]S. Abhishek Anand, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 530-545 (2019) - [j26]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [j25]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. IEEE Trans. Dependable Secur. Comput. 16(6): 1040-1053 (2019) - [j24]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c93]Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen, Nitesh Saxena:
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. ACSAC 2019: 42-56 - [c92]Manar Mohamed, Prakash Shrestha, Nitesh Saxena:
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. ACSAC 2019: 355-365 - [c91]Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. ISPEC 2019: 172-193 - [c90]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. NDSS 2019 - [c89]Maliheh Shirvanian, Summer Vo, Nitesh Saxena:
Quantifying the Breakability of Voice Assistants. PerCom 2019: 1-11 - [c88]S. Abhishek Anand, Payton Walker, Nitesh Saxena:
Compromising Speech Privacy under Continuous Masking in Personal Spaces. PST 2019: 1-10 - [c87]Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena:
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. PST 2019: 1-10 - [c86]Maliheh Shirvanian, Nitesh Saxena:
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. PST 2019: 1-10 - [c85]Babins Shrestha, Manar Mohamed, Nitesh Saxena:
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. PST 2019: 1-10 - [i19]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. CoRR abs/1907.05972 (2019) - 2018
- [j23]Prakash Shrestha, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. ACM Comput. Surv. 50(6): 92:1-92:39 (2018) - [j22]Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. J. Comput. Secur. 26(3): 311-333 (2018) - [c84]Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. ACSAC 2018: 467-477 - [c83]Prakash Shrestha, Babins Shrestha, Nitesh Saxena:
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. CNS 2018: 1-9 - [c82]S. Abhishek Anand, Nitesh Saxena:
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. CODASPY 2018: 103-110 - [c81]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [c80]S. Abhishek Anand, Nitesh Saxena:
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. IEEE Symposium on Security and Privacy 2018: 1000-1017 - [c79]Prakash Shrestha, Nitesh Saxena:
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. WISEC 2018: 99-110 - [i18]Kiavash Satvat, Nitesh Saxena:
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports. CoRR abs/1808.01718 (2018) - [i17]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i16]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - 2017
- [j21]Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot:
On the security and usability of dynamic cognitive game CAPTCHAs. J. Comput. Secur. 25(3): 205-230 (2017) - [j20]Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Trans. Inf. Forensics Secur. 12(4): 901-913 (2017) - [c78]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. ACSAC 2017: 499-511 - [c77]Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena:
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration. CCS 2017: 73-87 - [c76]Maliheh Shirvanian, Nitesh Saxena:
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. CCS 2017: 1329-1342 - [c75]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. Financial Cryptography 2017: 227-246 - [c74]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [c73]S. Abhishek Anand, Nitesh Saxena:
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. WISEC 2017: 173-183 - [c72]Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. WISEC 2017: 195-206 - [c71]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield:
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study. WWW 2017: 1571-1580 - [i15]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. CoRR abs/1707.05285 (2017) - 2016
- [j19]Jose Omar Maximo, Ajaya Neupane, Nitesh Saxena, Robert M. Joseph, Rajesh K. Kana:
Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search. Brain Connect. 6(4): 335-344 (2016) - [j18]Ajaya Neupane, Nitesh Saxena, Jose Omar Maximo, Rajesh K. Kana:
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEE Trans. Inf. Forensics Secur. 11(9): 1970-1983 (2016) - [c70]Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena:
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. ACSAC 2016: 265-276 - [c69]Manar Mohamed, Nitesh Saxena:
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. ACSAC 2016: 277-288 - [c68]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c67]